kevan + hacking   88

Confessions of a Disk Cracker: the secrets of 4am. - Paleotronic Magazine
"Preservation is driven by pirates, who are driven by ego but constrained by the technical limitations of their era. In the 1980s, this meant storage space and network speed."
software  piracy  history  hacking  via:lmg 
july 2018 by kevan
Siri and Alexa can be hijacked with inaudible messages, researchers warn
"They turned voice commands into ultrasonic frequencies that can be heard and used to control devices but are inaudible to humans."
sound  hacking  secrets 
september 2017 by kevan - The Skeleton Deck
"It's a regular poker deck, combined with the numbers 1-6 in eight coloured suits (red Stops, orange Bricks, yellow Suns, green Leaves, blue Drops, purple Shields, white Skulls and black Keys), six wildcards in six of those suits, and the numbers 1 through 52."
creations  cards  games  hacking 
march 2017 by kevan
I don't have time for a whole game, get me the EXPRESS!! | BoardGameGeek
"...taking popular games (or even thoroughly reviled games) that can take hours to play, and turning them into quick and light games that preserve the basic essence of the original game."
games  board  dice  hacking 
march 2016 by kevan
Ex Astris Scientia - Re-Used Props - Miscellaneous Equipment
"Many props of Star Trek were later modified or even recycled without changes to represent equipment for a different purpose or of another civilization."
television  hacking 
march 2016 by kevan
A Toy Ball That Teaches Kids to Code | WIRED
"Hackaball comes with a few suggested games, but is largely open-ended. For example, if Hackaball hits the ground, the lights inside will glow blue. If it gets shaken too hard, it’ll emit a squawk."
toys  programming  hacking 
march 2015 by kevan
Neighborhood mailbox stickers let communities display items they have to share | Springwise
"The idea is that homeowners place the stickers for the items they have on their mailbox so passersby can know if they’re good to knock on the door."
society  hacking  via:ole 
august 2014 by kevan
This App Trains You to See Farther - Popular Mechanics
"In a study published this week in the journal Current Biology, Seitz worked with 19 players on the University of California, Riverside, baseball team, and showed that his app UltimEyes lengthened the distance at which the players could see clearly by an average of 31 percent."
eyes  software  hacking 
february 2014 by kevan
DIY kindle scanner on Vimeo
"The DIY kindle scanner is an art installation reflecting this loss of rights Jeff Bezos first defended for us, but then chose to remove. It also is a statement about the futility of DRM."
lego  books  hacking  via:blech 
september 2013 by kevan
meltingice/flickr-store - GitHub
"Store arbitrary data with your 1TB Flickr cloud drive by encoding any file as a PNG. This is mostly a proof of concept right now."
hacking  secrets 
may 2013 by kevan
CUBESMITH - Rubik's Cube Twisty Puzzle Replacement Stickers - Home
"We now offer over 45 different colors of vinyl and over a dozen different colors of Lexan tiles to customize more than 30 different twisty puzzles, as well as many sets to replicate original color schemes."
puzzles  hacking 
may 2013 by kevan
DRM CHAIR on Vimeo
"A small sensor detects when someone sits and decrements a counter. Every time someone sits up, the chair knocks a number of time to signal how many uses are left. When reaching zero, the self-destruct system is turned on and the structural joints of the chair are melted."
furniture  hacking 
march 2013 by kevan
Flip All The Pronouns – blarg?
"[All] the dialog will now refer to Link as a young woman, rather than as a young man. I think I’ve gotten this right – this was all done directly on the original disk image with a hex editor, so all the changes needed to be the same byte-for-byte length, in-place."
games  language  hacking 
january 2013 by kevan
HOW TO SHARPEN PENCILS, The People's Bailout
"If you’re a debt broker, once you own someone’s debt you can do whatever you want with it — traditionally, you hound debtors to their grave trying to collect. We’re playing a different game."
money  hacking  via:james 
november 2012 by kevan
Ethiopian kids hack OLPCs in 5 months with zero instruction | DVICE
"We left the boxes in the village. Closed. Taped shut. No instruction, no human being. I thought, the kids will play with the boxes! Within four minutes, one kid not only opened the box, but found the on/off switch. He'd never seen an on/off switch. He powered it up. Within five days, they were using 47 apps per child per day. Within two weeks, they were singing ABC songs [in English] in the village. And within five months, they had hacked Android."
computers  africa  children  language  hacking  via:zarba 
november 2012 by kevan
The New French Hacker-Artist Underground | Magazine
"There is no law in France, it turns out, against the improvement of clocks."
secrets  time  paris  hacking  art  via:mugla 
january 2012 by kevan
Google Kills Its Other Plus, and How to Bring It Back -
"On Wednesday, Google retired a longer-standing 'plus': the + operator, a standard bit of syntax used to force words and phrases to appear in search results. The operator was part of Google since its launch in 1997 and built into every search engine since."
web  hacking  history 
october 2011 by kevan
Vetinari clock will drive you insane - Hack a Day
"The coil leads were disconnected from the clock circuit and connected to digital inputs of an Arduino. With a few random() calls, the clock keeps accurate but random time." A lot more viscerally unnerving than the Chronophage clock.
time  hacking  random 
october 2011 by kevan
Fearsquare - How dangerous are your check-ins?
"The FearSquare application takes a list of your ten most recent FourSquare check-ins and cross-references these with the UK Police Crime Statistics database."
crime  maps  hacking  police 
april 2011 by kevan wiki | Trains / SplitTickets
A good idea: a wiki for the ways in which you can split a UK train journey into two tickets with a cheaper total.
transport  money  hacking  wikis 
april 2011 by kevan
Peace News Log « How to Fill In Your Census Form without Lockheed Martin Profiting (long version)
"The rational approach would be to take part in the census but make processing your return as expensive to process as possible for Lockheed Martin. [...] Bar codes can be rendered ineffective by neatly filling in some or all of the white gaps between the bars of with a black pen."
politics  paper  hacking  money 
march 2011 by kevan
Katamari Hack
"This is a bookmarklet that turns any page into Katamari Damacy." Right-click to roll up increasingly larger page elements.
games  web  hacking 
march 2011 by kevan
BBC Radio 4b
"Built upon that sinking feeling of tuning into Radio 4 and hearing people acting at you, Radio 4b plays you a string of random programmes from Radio 4's factual archive. [...] You will not hear middle-class actors tapping a teaspoon and talking about divorce."
radio  hacking  creations 
march 2011 by kevan
Fun and Games with Cognitive Biases - Less Wrong
"Caution: Dark Arts! Explicit discussion of how to exploit bugs in human reasoning may lead to discomfort. You have been warned."
psychology  illusions  hacking  brains 
march 2011 by kevan
"While quietly running in the background Idiocy watches for people visiting Twitter insecurely, hijacks the session and posts a tweet warning them that they are vulnerable, with a link to a page explaining what has happened."
twitter  hacking  education  secrets  via:tomscott 
october 2010 by kevan
Market Data Firm Spots the Tracks of Bizarre Robot Traders - Science and Tech - The Atlantic
"Donovan thinks that the odd algorithms are just a way of introducing noise into the works. Other firms have to deal with that noise, but the originating entity can easily filter it out because they know what they did. Perhaps that gives them an advantage of some milliseconds."
money  hacking  cheating  via:bengoldacre 
august 2010 by kevan
"RACER is an analogue recreation of a computer racing game in the style of the classic WipeOut. It consists of a modified vintage arcade machine, a RC model car with a wireless camera, an a self-constructed racetrack/game level made entirely from cardboard."
games  hacking  via:nachimir 
august 2010 by kevan
Make: VCR Cat Feeder
"Any old VCR has a programmable timer that connects to motors for recording TV shows. This is analogous to feeding a cat, and following this principle, you can convert a VCR into a weekend pet feeder."
cats  food  technology  hacking 
july 2010 by kevan
Binder Clips as Cable Catchers Redux - binder clips - Lifehacker
Clamping a binder clip to the back of a desk, to hold a cable in the crook of its wire handle.
metal  computers  hacking 
april 2010 by kevan
Less Wrong: Akrasia Tactics Review
"I recently had occasion to review some of the akrasia tricks I've found on Less Wrong, and it occurred to me that there's probably quite a lot of others who've tried them as well. Perhaps it's a good idea to organize the experiences of a couple dozen procrastinating rationalists?"
time  psychology  software  delusions  hacking  via:adrianhon 
february 2010 by kevan
Ripping Palettes for Better Colors - Indiegamer Developer Discussion Boards
"Here's a process that yields great color schemes fast, from any source image. The process extracts the color scheme from an existing work of art and arranges the colors into an organized palette image. Use this resulting image like a painter's palette to choose colors for your own artwork or game assets."
art  hacking  via:zarba 
june 2009 by kevan - Instant adventure gaming
Multiplayer browser versions of old Sierra games. "You play your own singleplayer game. Other players do the same, and when you are in the same location, you can see and talk to each other. Note that the game status such as doors and events are not shared."
games  if  hacking  via:waxy 
april 2009 by kevan
Aza’s Thoughts » Vote! How to Detect the Social Sites Your Visitors Use
Using Javascript to examine visited-link colours and probe your browser history, a bit unnervingly. "We can use this information to only display one or two badges that we know the reader uses. It solves the which-badges-to-display problem."
web  hacking  via:lmg 
july 2008 by kevan
SkeptoBot: Time-lapse Vid of Dissolving an Oyster Card in acetone (aka nail varnish)
"So tomorrow morning I'll attempt to use this naked oyster card to journey to work. If I'm successful (and not arrested for terrorism) I'll have to decide what my new oyster card will be."
technology  transport  hacking  science  london  via:lmg 
may 2008 by kevan
The Rules of Beeping: Exchanging Messages Via Intentional "Missed Calls" on Mobile Phones
"With the exception of sequences, [all] beeps look alike. To senders and receivers, however, the distinctions among the beeps are surprisingly clear, based on what they know of the situation, the time, and the people involved in the exchange."
phones  language  hacking  society 
february 2008 by kevan
DVD, Blu-ray & HD-DVD Review - Blade Runner: The Final Cut - All Versions
"Harrison Ford was unavailable due to scheduling issues, so his son Ben was brought in correct this [with] the same chin scar (via make-up) that his father has, saying the correct lines. His mouth was digitally inserted over his father's seamlessly."
films  technology  illusions  hacking  via:lmg 
december 2007 by kevan
Firefox plugin. "You can block sites within fixed time periods (e.g., between 9am and 5pm), after a time limit (e.g., 10 minutes in every hour), or with a combination of time periods and time limit (e.g., 10 minutes in every hour between 9am and 5pm)."
web  hacking  time 
november 2007 by kevan
Evil Mad Scientist Laboratories - How to hack LEDs into Lego minifigures for Halloween
"In what seems like a miraculous coincidence, a standard LED fits exactly into the head of a Lego minifigure."
lego  light  hacking 
november 2007 by kevan
Facebook custom app hider –
"This [Greasemonkey] script will add a cross to each application on a user page; just click it, and you'll never be bothered by that app again - in user profiles, or mini-feeds."
web  hacking 
november 2007 by kevan
Matt's Idea Blog: How to use the "I'm not going to ____" mind hack
"The easiest way [to] trick the reactive brain is to be subtle: convince it there is no threat by pretending to yourself that you are not going to do the task. [...] 'I'm not really going to write that report now, but I'll just get out the file.'"
brains  hacking  via:rwhe 
august 2007 by kevan
Theme Hacks - New Themes for Old Games
An old idea of mine; alternate settings for existing boardgames, leaving the rules intact. I was playing Shadows Over Camelot last week and realising that it'd work just as well (and actually feel more coherent) if it was played as a zombie mall siege.
creations  games  mutation  hacking  zombies  wikis 
july 2007 by kevan
Sneakers (1992)
Arbitrary gadget-heist with an odd mix of realistic and ridiculous pitfalls.
filmlog  2stars  technology  computers  hacking  secrets  crime  via:brendan 
july 2007 by kevan
Xorph Dot Com | Clockers
"In a world not quite like our own, where the industrial revolution was triggered not by steam, but by springs [...] Daedelus Murphy and his ragtag band of friends and rivals are about to learn that that curiosity can be the most dangerous crime of all."
films  theatre  mutation  technology  history  crime  hacking  monkeys 
june 2007 by kevan
Hackers (1996)
Watched as the second half of Holly and Brendan's steampunk-rewrite-readthrough. It's great when what you assume is just an abstract neon-cityscape metaphor of boring hack work is revealed to be actually running on their 28.8bps laptop screens.
filmlog  2stars  hacking  computers  crime  viruses 
june 2007 by kevan
The RFID Guardian: a firewall for your tags: Page 1
"The Guardian needs to do this lookup quickly, since it must make a decision about whether to jam the tag's response within 320.9µs—the amount of time between the RFID reader's request and the beginning of the tag's transmission back to the reader."
rfid  surveillance  technology  hacking  via:rodcorp 
may 2007 by kevan
Freakonomics Blog » How to Cheat the Mumbai Train System
"You pay 500 rupees (about $11) to join an organization of fellow ticketless travelers. Then, if you do get caught traveling without a ticket, you pay the fine to the authorities and [the] ticketless-traveler organization [refunds] you 100% of the fine."
transport  hacking  money  india 
march 2007 by kevan
A con as big as the Ritz | Weekend | Guardian Unlimited
Stories of a credit-card fraudster. "I knew you needed a range of security information to back up any significant purchase on a card, not just the data on the card itself. Yet that was all I was being given when customers were buying phones through me."
crime  phones  lies  hacking  money 
march 2007 by kevan
Coupon codes for thousands of online stores -
An intriguing spinoff of bugmenot, sharing the scattershot money-off codes that online retailers distribute through emails and adverts. Success percentages all look rather low, though.
money  shops  hacking 
march 2007 by kevan
Microsoft confirms Vista Speech Recognition remote execution flaw | George Ou |
Exploiting speech recognition by having a PC play MP3 instructions at itself. "I have verified that I can create a sound file that can wake Vista speech recognition, open Windows Explorer, delete the documents folder, and then empty the trash."
hacking  software  sound  via:found 
february 2007 by kevan
Now That a Penny Isn't Worth Much, It's Time to Make It Worth 5 Cents - New York Times
"With about 140 billion pennies in circulation [this] rebalance would make them worth $7 billion. [...] Plus, the money would go disproportionately to the poor, more than offsetting any 'rounding tax' from eliminating the penny."
money  hacking  metal  history  politics  via:freakonomics 
february 2007 by kevan
Find Misspelled Listings on eBay Auction Sites
Explore the dark and unbidden corners of eBay by autogenerating a search full of common typos. "Slimeline playstaion 2 with 6 games."
shops  cheating  hacking  mutation  via:lmg 
february 2007 by kevan
Light Blue Touchpaper » Chip & PIN terminal playing Tetris
"[Even] perfect tamper resistance only ensures that the terminal will no longer be able to communicate with the bank once opened. It does not prevent anyone from replacing most of the terminal's hardware and presenting it to customers as legitimate."
technology  money  games  hacking  via:waxy 
january 2007 by kevan
Car owners can fake it with add-on luxury emblems -
"Mercedes owners can buy the lettering indicating their cars are the high-end AMG version for about $65 at a dealer's parts department. Chrysler 300 owners who want their cars to mimic the Hemi-powered 300C can buy the insignia for about $12.50."
transport  hacking  illusions  lies 
november 2006 by kevan
Mind Performance Hacks - Ron Hale-Evans
A great collection of tricks and contexts for generating and keeping track of ideas, improving short and long term memory, and maintaining general rational-positive-thinking mental health. Inspiring.
booklog  brains  psychology  memory  dreams  hacking 
september 2006 by kevan
Kevin Kelly -- Street Use
"[Pirates] utilized discarded medical X-ray film as the base material for new record discs; however, the method became so widespread in Hungary that not only amateurs, but the Hungarian Radio made sound recordings on such recycled X-ray films."
music  russia  history  technology  hacking  via:waxy 
september 2006 by kevan
Chumby Industries
"What we decided to build was a really low-cost, wireless, Internet-connected device that will sit on your bedside table (or in your bathroom, or kitchen, or living room [...]) that could do a lot more than this old clock radio."
technology  hacking  web 
august 2006 by kevan
Wired 14.05: The RFID Hacking Underground
"(Molnar hastily erases the 'AB,' saying that he despises library vandalism.) He fumes at the Oakland library's failure to lock the writable area. 'I could erase the barcodes and then lock the tags. The library would have to replace them all.'"
technology  hacking  books  libraries  surveillance  shops  via:anne 
july 2006 by kevan
Tricks of the Trade: Artist
"If your magic marker is running dry, tape a string to the bottom of it and spin it over your head in a big circle. A few times around will generate enough centrifugal force to push any remaining ink to the tip."
writing  art  hacking 
may 2006 by kevan
Temporary Services - Prisoners' Inventions
Improvised tools, appliances and game pieces. "When I set my mind to the task, though, I recognized the surprising range of inventions and innovations that I had witnessed. I had just become so used to it all that the uniqueness no longer registered."
prison  technology  hacking  design  via:arbroath 
may 2006 by kevan
MindPerformanceHacks - Mentat Wiki
"You'll find links to separate pages for each of the book's 75 hacks below, where you can comment on the book, suggest material for a sequel or second edition, make corrections, and so on."
books  psychology  brains  hacking 
april 2006 by kevan
BBC NEWS | Guerrilla gardeners wage turf war
"Mr Reynolds said he has never run into any problems with the authorities - in fact he even entered one of his guerrilla gardens into a local 'in bloom' competition and got a nomination."
plants  london  hacking  via:arbroath 
march 2006 by kevan
YouTube - How to peel cooked potato skin in one shot.
Overdramatic Japanese video clip: slice a circle around the skin before boiling it, then dip it in ice-cold water for a moment, and the skin slides off.
food  hacking  japan 
march 2006 by kevan
New Scientist - Activists hijack public CCTV signal
"The feed had been crudely scrambled [...] but the activists were able to unscramble it using commercial video processing software. This enabled them to view everything recorded by the camera, and revealed both its capabilities and shortcomings."
surveillance  technology  hacking 
january 2006 by kevan
Spark Fun Electronics - Portable Rotary Cellular Phone
Converting an old rotary phone. "You dial 3035551234 and hyperterminal will spit back '303-555-1234'. The firmware took a surprisingly small amount of time. Who knew this old hardware would mate so nicely with something 50 years later?"
hacking  phones  history  technology 
october 2005 by kevan
Wikipedia: Local Exchange Trading Systems
"Local Exchange Trading Systems (LETS) and Schemes are local, non-profit exchange networks in which all kinds of goods and services can be traded without the need for money." Some brilliant Nomic-style names for local token currencies.
money  society  hacking  via:raven 
october 2005 by kevan
Press Your Luck
Beating a non-random game-show prize sequence: "In November of 1983, he recorded every episode of Press Your Luck over the course of several weeks. [Larsen] froze the images to examine randomized tile sequences frame by frame."
cheating  money  random  television  hacking  via:qwghlm 
september 2005 by kevan Remote-Controlled Humans
Hacking the body's vestibular system with two electric-current earpieces, to give video games some genuine centrifugal nausea, rather than the mere illusion of it. Also to make people fall over or walk into traffic.
technology  ears  hacking  games  walking  via:plasticbag 
august 2005 by kevan
New York Times: Slicing Familiar Films Into Something New
"It opens with his 1995 'Telephones,' which samples scenes from scores of Hollywood movies in which actors answer, talk on or hang up telephones and melds these moments, almost always turning points in the plot, into a single conversation."
films  art  phones  hacking 
july 2005 by kevan
1UP.COM: Wage Slaves
Paying cheap Chinese labour to oversee MMORPG macros. "Weeks go by as I chase ghosts and rumors of Chinese workers clicking 12 hours a day. Word has it that 300 farmers are working at computers lined up in airport hangars somewhere in Asia."
games  hacking  business  money  china  mmorpgs 
july 2005 by kevan
Bring Dead Art Back to Life!
Competition to remix the (now public domain) Night of the Living Dead into fresh, lurching new media. Winner was a deadpan public-service-parody survival video, after Max Brooks - a bit inauthentic, but good use of clips.
zombies  art  hacking  music  videos 
february 2005 by kevan
Playing UT2003 at 0.1% of normal speed
"At that speed it became more like an elaborate chess game, where you had minutes to decide where to go or who to shoot first." Much like the subgame-feeling timeshock weapon in Project Eden.
games  hacking  time  chess 
january 2005 by kevan
Mediocre bookmarklets, but an indispensable "toggle CSS" one.
hacking  web 
december 2004 by kevan
43 Folders: More Moleskine Hacks
Some excellent suggestions, including the comments. (Browsing back, the author's original Moleskine hack is "store a printed copy of your Amazon wishlist in the pocket", which is a good one.)
hacking  paper  writing 
november 2004 by kevan
NetHack Photography Patch
"You examine the photograph: You see a close-up shot of a gnome lord. He looks rather stunned. He is wielding a thonged club. He is by a fountain. Part of the gnome lord's head is cut off."
download  games  hacking  nethack  photos  software 
november 2004 by kevan
Wired News: Inventor Rejoices as TVs Go Dark
Life imitates Munnery's Buckethead Tellyban (who had giant lorry-mounted transmitters disabling whole flatblocks): "When activated, it spends over a minute flashing out 209 different codes to turn off televisions, the most popular brands first."
cheating  hacking  technology  television 
october 2004 by kevan
ljviz - LiveJournal friends/interests visualization
A LiveJournal version of, displaying friends according to number-of-shared interests, or interests according to number-of-interested-friends. Nice work.
hacking  meta  society  web  weblogs 
september 2004 by kevan
Eliyon: Artificial Intelligence
Scraping and parsing company web pages to build up patchwork employee CVs, rather scarily.
business  hacking  surveillance  web 
august 2004 by kevan
The Rev. Brendan Powell Smith - LEGO
Lots of excellent work:- a Lego chessboard, a wall of heads, facial customisations, "headlight" patterns, space pirates...
faces  hacking  lego  pirates 
july 2004 by kevan - a way to post
More LazyWeb-slinging - a fantastic alternative bookmarklet for that suggests tags (from your set) that previous users have used for the link.
hacking  meta  web 
july 2004 by kevan
Wired 12.06: Cracking the Code to Romance
Creepy people. "You can get the [Friendster] profiles on everyone in your local café [by sniffing WiFi traffic for email addresses], then see who their friends are, and just walk up to them and ask, 'Aren't you Tom's friend?'"
hacking  love  lunacy  psychology  society  technology  cheating 
june 2004 by kevan
« earlier      
per page:    204080120160

related tags

2stars  africa  art  board  booklog  books  brains  business  cards  cats  cheating  chess  children  china  computers  creations  crime  delusions  design  dice  download  dreams  ears  education  email  eyes  faces  filmlog  films  food  furniture  games  hacking  history  if  illusions  india  japan  language  lego  libraries  lies  light  london  love  lunacy  maps  memory  meta  metal  mmorpgs  money  monkeys  music  mutation  nethack  paper  paris  phones  photos  piracy  pirates  plants  pointless  police  politics  prison  programming  psychology  puzzles  radio  random  rfid  russia  science  secrets  shops  society  software  sound  surveillance  technology  television  terrorism  theatre  time  toys  transport  twitter  via:adrianhon  via:anne  via:arbroath  via:bengoldacre  via:blech  via:brendan  via:found  via:freakonomics  via:james  via:lmg  via:mugla  via:nachimir  via:ole  via:plasticbag  via:qwghlm  via:raven  via:rodcorp  via:rwhe  via:tomscott  via:waxy  via:zarba  videos  viruses  walking  web  weblogs  wikis  writing  zombies 

Copy this bookmark: